A Worm in the Apple
Exploration of Mac malware
Wes Widner
@kai5263499
wes@manwe.io
Introduction
Information security engineer by day,
malware researcher by night
Also father of 4, so nights tend to be pretty
short
Previous talks have been about malware
pipelines in general
Macs are secure, right?
Before 2012
After 2012
Flashback
Actually it started in September 2011
Got its name by offering a Flash upgrade
Poor English and other errors gave it away
In February 2012 it changed tactics
Took advantage of an unpatched Java vulnerability
Apple still argues it was Sun’s fault
Claimed 600k (~1%) according to Dr Web
Generated revenue (~$14k) through click fraud
A worm in the apple
A worm in the apple
Flashback part 2
~20k infections as recently as 2014
Tracked by Intego sinkhole
No big deal
In reality Apple spent the rest of the year cleaning up the mess
Apple suddenly found themselves playing catch up
But that was a fluke, right?
Apple and many experts still don’t recommend using
protection
Infections are rare
Apple is taking care of it
Perhaps some history will help
Mac malware history
1982 Prehistory: Elk Cloner
1987 nVIR
1988 HyperCard
1990 MDEF
1991 German folk tunes
1995 Word macro viruses
1996 Laroux – viruses for Excel
1996 AutoStart 9805 and Sevendust
2006 Exploit.OSX.Safari, aka OSX.Exploit.Metadata / Leap, aka Oompa
Loompa, the first virus for Mac OS X / Inqtana / OSX.Exploit.Launchd /
Macarena
2007 RSPlug, aka DNSChanger, aka Jahlav, aka Puper / OpenOffice
BadBunny and RSPlug financial malware
2008 MacSweeper, aka Immunizator / AsTHT, aka Hovdy, aka AplS.Saprilt /
PokerStealer, aka Corpref / Lamzev, aka Malev / Scareware, backdoors and
Jahlav
2009 iServices, aka iWorkServices, aka Krowi / Tored
2010 HellRTS, aka Pinhead, aka Hellraiser / OpinionSpy, aka Premier Opinion,
aka Spynion / Koobface, aka Boonana
2011 BlackHole RAT, aka MusMinim, aka DarkHole / MacDefender, aka
MacSecurity, aka MacProtector, aka MacGuard, aka MacShield, aka Defma /
QHost, also HostMod-A / Revir, aka Imuler, aka Muxler / Flashback, aka
Flashfake / DevilRobber, aka Miner-D / FinFisher
2012 FileSteal, Hackback, KitM / Tibet, aka MacControl, aka MaControl, aka
MacKontrol / Sabpab, aka Sabpub, aka Mdropper, aka Lamadai, aka Olyx /
FkCodec/Codec-M / Maljava / GetShell, aka SET.gen, aka ShellCode, aka
MetaData, aka TESrel / Crisis, aka Morcut, aka DaVinci / NetWeird, aka
Wirenet / Jacksbot / Dockster / SMSSend
2013 Pintsized / CallMe / Minesteal / KitM / Janicab / ClickAgent / Leverage /
Icefog
2014 LaoShu / CoinThief / XSLCmd / iWorm / Ventir / WireLurker, aka Machook
2015 Lamadai / Kitm / Hackback / LaoShu / Appetite,
trojan targeting government organizations / Imuler /
Coin Thief / Suspend-resume rootkit
2016 KeRanger, first ransomware / Mokes / Keydnap
/ USB attack
A worm in the apple
A worm in the apple
A worm in the apple
A worm in the apple
A worm in the apple
A worm in the apple
Apple still actively fights with vendors
iOS is a heavily walled garden
OSX is becoming a walled garden
A worm in the apple
A worm in the apple
A worm in the apple
A worm in the apple
A worm in the apple
A worm in the apple
A worm in the apple
A worm in the apple
A worm in the apple
The Apple fights back
A worm in the apple
A worm in the apple
A worm in the apple
iDroid
A worm in the apple
A worm in the apple
2009 XProtect / File Quarantine
2011 Sandboxing
2012 Gatekeeper
2015 System Integrity Protection
2016 XProtect + Yara
A worm in the apple
Firewall
OSX comes with one one but two firewalls
Application level firewall (alf)
Packet Filter (pf)
Little Snitch
Icefloor - open source GUI pf manager
Software installation
Archives everywhere
Application bundles
DMG
What magic bytes?
FileVault encryption
PKGs
the self-executables of the OSX world
Natively compressed in xar format
Code signing
XNU
Hybrid
BSD
POSIX interface
Mandatory Access Control Framework
Mach
Microkernel developed at Carnegie Mellon
For parallel computing
Released in 1985
Huxley the Platapus
MachO
Similar to ELF
Biggest difference is native code-signing support
Same magic bytes (0xCAFEBABE) as Java class files
IPC ports
Not network ports
Unix ports but in kernel land
Resource forks
A worm in the apple
A worm in the apple
Little Flocker
Boot - in the beginning
UEFI
FAT boot partition
Firmware passwords
Pystar and Rebel EFI
Copyrighted bootloader
Physical attacks
Firewire DMA
Evil USB
kext - Kernel extensions
A worm in the apple
A worm in the apple
A worm in the apple
A worm in the apple
Books worth getting
Thanks for attending!
Mac malware feed: http://ow.ly/O1WM303qAkV
Mac infosec homebrew tap: http://ow.ly/c1LZ303pKwa
OSX Security Awesome: http://ow.ly/uWEj303pKuf
These slides: http://ow.ly/DpNQ305KfPd

More Related Content

PPT
Today's malware aint what you think
PPTX
null Bangalore meet Feb 2010 - news Bytes
PPT
Twitter And Health Care
PPT
Code Red Virus
PPT
Code Red Worm
PPS
Most Malignant Viruses
PPTX
problem statement on security
DOC
Computer worm
Today's malware aint what you think
null Bangalore meet Feb 2010 - news Bytes
Twitter And Health Care
Code Red Virus
Code Red Worm
Most Malignant Viruses
problem statement on security
Computer worm

What's hot (19)

PPT
Malware by Ms. Allwood
PPT
Computer Worms
PPTX
Iloveyou virus
PPTX
Malwares
PPTX
Virus worm trojan
PPT
Malware
PPT
Simile Virus
PPT
Computer Viruses
DOC
Web virus activity
PPT
Comp. Viruses
PPTX
Malware- Types, Detection and Future
PPTX
News Bytes - June 2015 - Null HYD
PPT
PPT
Historyofviruses
PPT
All about viruse,Malwares,
PPTX
Trojan virus & backdoors
PPT
Trojan Horse Virus
PPS
introduction to malwares,virus,trojan horse
PPT
I Love You =D
Malware by Ms. Allwood
Computer Worms
Iloveyou virus
Malwares
Virus worm trojan
Malware
Simile Virus
Computer Viruses
Web virus activity
Comp. Viruses
Malware- Types, Detection and Future
News Bytes - June 2015 - Null HYD
Historyofviruses
All about viruse,Malwares,
Trojan virus & backdoors
Trojan Horse Virus
introduction to malwares,virus,trojan horse
I Love You =D
Ad

Viewers also liked (8)

PDF
BurdetteFinalProjectStoryboard
PPTX
Burdetteudl
PPTX
Understanding common body language and facial expressions
PPT
PPTX
Carlos Goes to School Storyboard
PDF
Chas
PPTX
Storyboard Carlos Goes to School
PPT
選書(補助)ツールの開発と運用(提供用)
BurdetteFinalProjectStoryboard
Burdetteudl
Understanding common body language and facial expressions
Carlos Goes to School Storyboard
Chas
Storyboard Carlos Goes to School
選書(補助)ツールの開発と運用(提供用)
Ad

Similar to A worm in the apple (20)

PDF
Threat report 2015_v1
PDF
Rp quarterly-threat-q1-2012
PPT
Thane Barnier MACE 2016 presentation
PDF
Smart Bombs: Mobile Vulnerability and Exploitation
PPTX
The most well known closed vulnerabilities
PPTX
Top mobile security threats
PDF
Mobile threat-report-mid-year-2018 en-us-1.0
PDF
Computer Security Principles and Practice 4th Edition Stallings Test Bank
PDF
Apt presso good to learn
PDF
Dan Guido SOURCE Boston 2011
PPTX
Trojans and backdoors
PDF
Palestra Jeferson Propheta - Wanna Cry more
PDF
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
PDF
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
PDF
Rp quarterly-threat-q1-2012
PPTX
2014: Mid-Year Threat Review
PDF
Computer Security Principles and Practice 4th Edition Stallings Test Bank
PDF
Chapter 1, Transformasi antivirus
PDF
Healthcare forum perry-david m-everything you know is wrong!
Threat report 2015_v1
Rp quarterly-threat-q1-2012
Thane Barnier MACE 2016 presentation
Smart Bombs: Mobile Vulnerability and Exploitation
The most well known closed vulnerabilities
Top mobile security threats
Mobile threat-report-mid-year-2018 en-us-1.0
Computer Security Principles and Practice 4th Edition Stallings Test Bank
Apt presso good to learn
Dan Guido SOURCE Boston 2011
Trojans and backdoors
Palestra Jeferson Propheta - Wanna Cry more
Why mobile-should-stop-worrying-learn-love-root-andrew-hoog-viaforensics-rsa-...
Deja vu security Adam Cecchetti - Security is a Snapshot in Time BSidesPDX ...
Rp quarterly-threat-q1-2012
2014: Mid-Year Threat Review
Computer Security Principles and Practice 4th Edition Stallings Test Bank
Chapter 1, Transformasi antivirus
Healthcare forum perry-david m-everything you know is wrong!

More from Wes Widner (6)

PPTX
"make secure" securing the development supply chain All Things Open 2019
PPTX
DIY Jarvis All Things Open 2019
PPTX
Alexa is a snitch - Hacker Halted 2019
PPTX
Containing the cloud
PPTX
The sound of evil
PPTX
Homeland security
"make secure" securing the development supply chain All Things Open 2019
DIY Jarvis All Things Open 2019
Alexa is a snitch - Hacker Halted 2019
Containing the cloud
The sound of evil
Homeland security

Recently uploaded (20)

PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PPTX
Viva Digitally Software-Defined Wide Area Network.pptx
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PDF
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
PDF
Computer Networking, Internet, Casting in Network
DOCX
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
PPTX
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
PPTX
Tìm hiểu về dịch vụ FTTH - Fiber Optic Access Node
PPT
250152213-Excitation-SystemWERRT (1).ppt
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
PPT
12 Things That Make People Trust a Website Instantly
PPTX
MY PRESENTATION66666666666666666666.pptx
PDF
Exploring The Internet Of Things(IOT).ppt
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PPTX
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
Viva Digitally Software-Defined Wide Area Network.pptx
Layers_of_the_Earth_Grade7.pptx class by
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
Computer Networking, Internet, Casting in Network
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
Tìm hiểu về dịch vụ FTTH - Fiber Optic Access Node
250152213-Excitation-SystemWERRT (1).ppt
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
Alethe Consulting Corporate Profile and Solution Aproach
Alethe Consulting Corporate Profile and Solution Aproach
AI_Cyberattack_Solutions AI AI AI AI .pptx
12 Things That Make People Trust a Website Instantly
MY PRESENTATION66666666666666666666.pptx
Exploring The Internet Of Things(IOT).ppt
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx

A worm in the apple

  • 1. A Worm in the Apple Exploration of Mac malware Wes Widner @kai5263499 wes@manwe.io
  • 2. Introduction Information security engineer by day, malware researcher by night Also father of 4, so nights tend to be pretty short Previous talks have been about malware pipelines in general
  • 6. Flashback Actually it started in September 2011 Got its name by offering a Flash upgrade Poor English and other errors gave it away In February 2012 it changed tactics Took advantage of an unpatched Java vulnerability Apple still argues it was Sun’s fault Claimed 600k (~1%) according to Dr Web Generated revenue (~$14k) through click fraud
  • 9. Flashback part 2 ~20k infections as recently as 2014 Tracked by Intego sinkhole No big deal In reality Apple spent the rest of the year cleaning up the mess Apple suddenly found themselves playing catch up
  • 10. But that was a fluke, right?
  • 11. Apple and many experts still don’t recommend using protection Infections are rare Apple is taking care of it
  • 12. Perhaps some history will help
  • 13. Mac malware history 1982 Prehistory: Elk Cloner 1987 nVIR 1988 HyperCard 1990 MDEF 1991 German folk tunes 1995 Word macro viruses 1996 Laroux – viruses for Excel 1996 AutoStart 9805 and Sevendust
  • 14. 2006 Exploit.OSX.Safari, aka OSX.Exploit.Metadata / Leap, aka Oompa Loompa, the first virus for Mac OS X / Inqtana / OSX.Exploit.Launchd / Macarena 2007 RSPlug, aka DNSChanger, aka Jahlav, aka Puper / OpenOffice BadBunny and RSPlug financial malware 2008 MacSweeper, aka Immunizator / AsTHT, aka Hovdy, aka AplS.Saprilt / PokerStealer, aka Corpref / Lamzev, aka Malev / Scareware, backdoors and Jahlav 2009 iServices, aka iWorkServices, aka Krowi / Tored 2010 HellRTS, aka Pinhead, aka Hellraiser / OpinionSpy, aka Premier Opinion, aka Spynion / Koobface, aka Boonana
  • 15. 2011 BlackHole RAT, aka MusMinim, aka DarkHole / MacDefender, aka MacSecurity, aka MacProtector, aka MacGuard, aka MacShield, aka Defma / QHost, also HostMod-A / Revir, aka Imuler, aka Muxler / Flashback, aka Flashfake / DevilRobber, aka Miner-D / FinFisher 2012 FileSteal, Hackback, KitM / Tibet, aka MacControl, aka MaControl, aka MacKontrol / Sabpab, aka Sabpub, aka Mdropper, aka Lamadai, aka Olyx / FkCodec/Codec-M / Maljava / GetShell, aka SET.gen, aka ShellCode, aka MetaData, aka TESrel / Crisis, aka Morcut, aka DaVinci / NetWeird, aka Wirenet / Jacksbot / Dockster / SMSSend 2013 Pintsized / CallMe / Minesteal / KitM / Janicab / ClickAgent / Leverage / Icefog 2014 LaoShu / CoinThief / XSLCmd / iWorm / Ventir / WireLurker, aka Machook
  • 16. 2015 Lamadai / Kitm / Hackback / LaoShu / Appetite, trojan targeting government organizations / Imuler / Coin Thief / Suspend-resume rootkit 2016 KeRanger, first ransomware / Mokes / Keydnap / USB attack
  • 23. Apple still actively fights with vendors iOS is a heavily walled garden OSX is becoming a walled garden
  • 40. 2009 XProtect / File Quarantine 2011 Sandboxing 2012 Gatekeeper 2015 System Integrity Protection 2016 XProtect + Yara
  • 42. Firewall OSX comes with one one but two firewalls Application level firewall (alf) Packet Filter (pf)
  • 44. Icefloor - open source GUI pf manager
  • 45. Software installation Archives everywhere Application bundles DMG What magic bytes? FileVault encryption PKGs the self-executables of the OSX world Natively compressed in xar format
  • 46. Code signing XNU Hybrid BSD POSIX interface Mandatory Access Control Framework Mach Microkernel developed at Carnegie Mellon For parallel computing Released in 1985 Huxley the Platapus
  • 47. MachO Similar to ELF Biggest difference is native code-signing support Same magic bytes (0xCAFEBABE) as Java class files IPC ports Not network ports Unix ports but in kernel land Resource forks
  • 51. Boot - in the beginning UEFI FAT boot partition Firmware passwords Pystar and Rebel EFI Copyrighted bootloader Physical attacks Firewire DMA Evil USB kext - Kernel extensions
  • 57. Thanks for attending! Mac malware feed: http://ow.ly/O1WM303qAkV Mac infosec homebrew tap: http://ow.ly/c1LZ303pKwa OSX Security Awesome: http://ow.ly/uWEj303pKuf These slides: http://ow.ly/DpNQ305KfPd

Editor's Notes

  • #7: http://www.thesafemac.com/about-the-flashback-malware/ http://www.pcworld.com/article/253270/600_000_infected_macs_found_in_botnet.html
  • #8: http://www.theatlantic.com/technology/archive/2012/06/its-official-apple-computers-are-no-longer-virus-free/258902/
  • #9: https://www.wired.com/2012/06/mac_viruses/
  • #12: http://www.pcadvisor.co.uk/how-to/security/do-apple-macs-need-antivirus-os-x-security-explained-3418367/
  • #14: https://nakedsecurity.sophos.com/2011/10/03/mac-malware-history/ http://www.reedcorner.net/mmg-catalog/
  • #16: http://www.infoworld.com/article/2607924/security/stop-sneaky-hackers-from-launching-dma-attacks.html
  • #17: http://thehackernews.com/2016/09/cross-platform-malware.html http://www.welivesecurity.com/2016/07/06/new-osxkeydnap-malware-hungry-credentials/ http://www.theregister.co.uk/2015/06/01/apple_suspend_bug_0day/ http://www.ehackingnews.com/2016/09/a-usb-device-can-steal-credentials-from.html
  • #18: https://www.documentcloud.org/documents/2459197-bit9-carbon-black-threat-research-report-2015.html
  • #19: http://bgr.com/2015/10/21/mac-malware-increase-2015/
  • #20: http://news.softpedia.com/news/business-confidence-in-mac-security-has-decreased-over-the-past-year-496723.shtml
  • #21: https://www.cnet.com/news/halo-still-in-effect-apple-sees-ipads-as-gateway-to-macs/
  • #22: http://www.reuters.com/article/uk-apple-security-idUSLNE74P01620110526
  • #23: https://nakedsecurity.sophos.com/2011/05/18/malware-on-your-mac-dont-expect-applecare-to-help-you-remove-it/
  • #25: http://www.kitguru.net/lifestyle/apple/matthew-wilson/apple-is-apparently-cracking-down-on-ios-anti-virus-apps/ https://www.certosoftware.com/why-arent-there-any-anti-spyware-apps-for-iphone/
  • #26: https://www.cnet.com/news/apple-kills-app-that-could-tell-if-your-iphone-was-hacked/
  • #28: http://www.forbes.com/sites/thomasbrewster/2016/07/19/apple-iphone-ios-9-vulnerabilities-like-stagefright/#525886283947 https://nakedsecurity.sophos.com/2016/08/05/apple-rushes-out-ios-update-shuts-out-jailbreakers/
  • #29: https://citizenlab.org/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/
  • #30: http://www.theverge.com/2016/8/4/12380036/apple-bug-bounty-program-vulnerability-security
  • #31: http://www.theregister.co.uk/2016/08/11/exodus_intelligence_500k_bounty/
  • #32: https://www.wired.com/2016/09/top-shelf-iphone-hack-now-goes-1-5-million/
  • #33: http://www.theregister.co.uk/2016/10/28/ios_bughunter_poc_floods_911/
  • #35: http://www.usatoday.com/story/news/nation/2016/09/16/usa-today-lawsuit-fbi-iphone-hack-san-bernardino/90477540/ https://www.wired.com/2016/09/heres-fbi-hacked-san-bernardino-shooters-iphone/
  • #36: https://www.jamf.com/blog/debate-over-ibm-confirms-that-macs-are-535-less-expensive-than-pcs/ https://9to5mac.com/2016/04/04/white-house-obama-iphone/
  • #37: http://www.reuters.com/article/us-apple-hackers-idUSBRE91I10920130219
  • #40: http://law.justia.com/cases/federal/appellate-courts/ca9/10-15113/10-15113-2011-09-28.html
  • #41: https://paolozaino.wordpress.com/2015/08/04/how-to-run-your-applications-in-a-mac-os-x-sandbox-to-enhance-security/ https://github.com/VirusTotal/yara/pull/463
  • #42: https://9to5mac.com/2016/02/09/sparkle-vulnerability-os-x/
  • #43: https://support.apple.com/en-us/HT201642 http://krypted.com/mac-security/command-line-alf-on-mac-os-x/ https://pleiades.ucsc.edu/hyades/PF_on_Mac_OS_X
  • #44: https://www.obdev.at/products/littlesnitch/index.html
  • #45: http://www.hanynet.com/icefloor/ http://murusfirewall.com/
  • #46: http://newosxbook.com/DMG.html https://www.davd.eu/posts/os-x-run-any-command-in-a-sandbox/ http://www.securitygeneration.com/security/mac-os-x-skype-0day-remote-code-execution-vulnerability/
  • #47: https://www.blackhat.com/presentations/bh-usa-09/DAIZOVI/BHUSA09-Daizovi-AdvOSXRootkits-PAPER.pdf
  • #49: https://objective-see.com/products/blockblock.html
  • #50: http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/
  • #51: https://www.zdziarski.com/blog/?page_id=6171
  • #53: https://objective-see.com/products/knockknock.html
  • #54: https://www.peterborgapps.com/lingon/
  • #55: http://yelp.github.io/osxcollector/
  • #56: https://techcrunch.com/2016/10/28/apples-new-intel-driven-macbooks-have-a-secondary-arm-processor-that-runs-touch-id-and-security/ https://www.cnet.com/special-reports/jony-ive-talks-about-putting-the-apple-touch-on-the-macbook-pro/